Computer crime

Results: 9938



#Item
71Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Computer security / Information security / Outline of computer security / Cyber security standards

Industrial & Research Challenges arising from User Requirements in Trustworthy ICT Building a European Security Environment among regions Prof. Norbert Pohlmann

Add to Reading List

Source URL: norbert-pohlmann.com

Language: English - Date: 2015-12-06 08:01:09
72Security / Prevention / Computer security / Safety / Computer network security / Crime prevention / National security / Insider threat / Threat / Risk management / Information security audit / Information security awareness

Opinion Managing Insider Threats Is a Key Component to Cyber Security June 13, 2016 Most directors recognize the growing importance of cyber security,

Add to Reading List

Source URL: www.raytheon.com

Language: English - Date: 2016-06-13 10:31:11
73Computing / Security / Cryptography / Crime prevention / Information governance / National security / Disk encryption / Computer security / Encryption / Android / Information security / USB flash drive

Desktop, Laptop, and Portable Device DRAFT - Data Classification System Requirements September 12, 2013 Purpose of this document This document outlines and provides an explanation for some of the most important and possi

Add to Reading List

Source URL: facultysenate.mst.edu

Language: English - Date: 2014-01-22 04:21:56
74Security / Safety / Crime prevention / Aerospace engineering / Aviation safety / Flight test / Product testing / Security alarm / Closed-circuit television / Computer security / Cockpit / AD Aerospace

AIRCRAFT SECURITY AND SAFETY REMOTE REAL-TIME SURVEILLANCE. WIRELESS COMMAND AND CONTROL FOR CRITICAL SYSTEMS. We provide the industry’s leading solutions to internal and external aircraft surveillance and situational

Add to Reading List

Source URL: www.meggitt.com

Language: English - Date: 2016-07-22 06:47:31
75Security / Prevention / Safety / National security / Crime prevention / Cryptography / Information governance / Cyberwarfare / Computer security / United States Department of Homeland Security / Information security / Professional certification

November 2, 2016 International Conference Registration Open, 7:00 am – 4:00 pm, Trinity A ISSA SIGs Sponsored Breakfast, 7:30 am – 8:15 am, Landmark B/C

Add to Reading List

Source URL: c.ymcdn.com

Language: English - Date: 2016-08-19 07:58:20
76Security / Prevention / Safety / Crime prevention / Security guards / Public safety / Surveillance / Bodyguard / Academi / Corporate security / Computer security

TACTICAL SECURITY/SAFETY TECHNIQUES ENTERPRISES, INC. PO Box 4794 • Poughkeepsie, NY 12602 • (Website: www.tstenterprisesinc.com E-mail Addresses: WILLIAM J. SLEIGHT, III Preside

Add to Reading List

Source URL: www.tstenterprisesinc.com

Language: English - Date: 2016-04-02 14:26:28
77Computing / Security / Cryptography / Cloud computing / Information technology management / Crime prevention / National security / Digital transaction management / XDTM Standard Association / Records management / Computer security / ARX

The xDTM Standard The Transaction Management Standard for an Open Digital World Executive Brief The xDTM Standard

Add to Reading List

Source URL: www.xdtm.org

Language: English - Date: 2016-06-28 14:48:03
78Security / Computing / Prevention / Computer security / Crime prevention / Cryptography / Information governance / National security / Cloud computing security / European Network Exchange / Norbert Pohlmann / Data security

Day 1 (November:00 10:15 Registration Opening Morning Coffee

Add to Reading List

Source URL: www.isse.eu.com

Language: English - Date: 2015-11-09 09:09:16
79Security / Cryptography / Prevention / E-commerce / Crime prevention / Information governance / National security / Computer security / Internet privacy / Authorization / Password / Privacy

University of Arkansas System Division of Agriculture Computer and Network Use Policy - PMGS 14-1

Add to Reading List

Source URL: division.uaex.edu

Language: English - Date: 2014-09-19 11:50:26
80Security / Computing / Prevention / Secure communication / Data security / Crime prevention / Cryptography / National security / Trustwave Holdings / Data breach / Computer security / Cyber-Insurance

Reprinted with permission from the October 2015 issue Cybercrimes And The Threat To Lender Data How stronger security and response plans can protect lenders from a data breach. By Lee Brodsky

Add to Reading List

Source URL: www.mortgagebankinginsurance.com

Language: English - Date: 2015-11-12 13:58:00
UPDATE